publications
2024
- Turn on, tune in, listen up: Maximizing side-channel recovery in cross-platform time-to-digital convertersACM Transactions on Reconfigurable Technology and Systems, 2024
2023
- Hardware Trojan Detection Using Machine Learning: A TutorialACM Transactions on Embedded Computing Systems, 2023
- Gotcha! I know what you are doing on the FPGA cloud: Fingerprinting co-located cloud FPGA accelerators via measuring communication linksIn Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
- Breaking the Design and Security Trade-off of Look-up-Table–Based ObfuscationACM Transactions on Design Automation of Electronic Systems, 2022
- Neuromorphic-Enabled Security for IoTIn 20th IEEE Interregional NEWCAS Conference, 2022
- LOCK&ROLL: Deep-Learning Power Side-Channel Attack Mitigation Using Emerging Reconfigurable Devices and Logic LockingIn 59th ACM/IEEE Design Automation Conference, 2022
- Survey of Machine Learning for Electronic Design AutomationIn Great Lakes Symposium on VLSI, 2022
2021
- Securing Hardware via Dynamic Obfuscation Utilizing Reconfigurable Interconnect and Logic BlocksIn 58th ACM/IEEE Design Automation Conference, 2021
2019
- Security and complexity analysis of LUT-based obfuscation: From blueprint to realityIn IEEE/ACM International Conference on Computer-Aided Design, 2019
2018
- Static Design of Spin Transfer Torques Magnetic Look Up Tables for ASIC DesignsIn Great Lakes Symposium on VLSI, 2018